Next Article in Journal
Gradient Ricci Solitons on Spacelike Hypersurfaces of Lorentzian Manifolds Admitting a Closed Conformal Timelike Vector Field
Next Article in Special Issue
Model and Algorithm for a Two-Machine Group Scheduling Problem with Setup and Transportation Time
Previous Article in Journal
Power Factor Modelling and Prediction at the Hot Rolling Mills’ Power Supply Using Machine Learning Algorithms
Previous Article in Special Issue
Simulation of Heuristics for Automated Guided Vehicle Task Sequencing with Resource Sharing and Dynamic Queues
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

REFS-A Risk Evaluation Framework on Supply Chain

by
István Mihálcz
and
Zsolt T. Kosztyán
*
Department of Quantitative Methods, Institute of Management, Faculty of Business and Economics, University of Pannonia, Egyetem u. 10., 8200 Veszprem, Hungary
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(6), 841; https://doi.org/10.3390/math12060841
Submission received: 13 December 2023 / Revised: 12 February 2024 / Accepted: 6 March 2024 / Published: 13 March 2024

Abstract

:
Large, powerful corporations were formerly solely and exclusively responsible for supplies, manufacturing, and distribution; however, the supply chain has undergone significant transformations over the last half-century. Almost all supply chain processes are currently outsourced, owing to the initiatives of cutting-edge, contemporary businesses. According to a compilation of studies, analysts, and news sources, the level of risk associated with modern supply chains is considerably higher than the majority of supply chain managers believe. Supply chain vulnerabilities continue to pose a substantial obstacle for a great number of organizations. Neglecting to adequately address these risks—encompassing natural disasters, cyber assaults, acts of terrorism, the credit crisis, pandemic scenarios, and war—could result in substantial reductions in metrics such as profitability, productivity, revenue, and competitive advantage. Unresolved concerns persist with respect to the risk assessment of the supply chain. The purpose of this article is to propose a framework for risk evaluation that can be efficiently applied to the evaluation of hazards within the supply chain. This research study significantly enhances the existing knowledge base by offering supply chain managers a pragmatic tool to evaluate their processes, regardless of the mathematical foundations or the variety of variables utilized in risk assessment. The outcomes of multiple aggregation methods are compared using a case study from an automotive EMS production; the conclusions are validated by risk and FMEA specialists from the same factory.

1. Introduction

In the past decade, numerous organizations have incurred expenses amounting to hundreds of millions of dollars or euros due to unforeseen disruptions and weaknesses in their supply chains. At the heart of these problems is the absence of dependable mechanisms to identify and effectively mitigate the escalating supply chain risks that result from increased global interconnectedness. As a consequence, the evaluation of supply chain risk is progressively gaining importance. There has been an exponential increase in the quantity of risk analysis papers published since the beginning of the century [1]. Considering the number of scholarly articles dedicated to the most widely used risk analysis techniques and pragmatic implementations of FMEA in diverse domains, the supply chain would rank last on this list [1]. Notwithstanding this, a multitude of concerns pertaining to the FMEA methodology continue to be unresolved in the recently published FMEA (released in [2]). In regard to supply chain risk analysis, uncharted territories still remain.
The evaluation and selection of suppliers are critical components of the supply chain. Dickson established the initial classification system in 1966 [3], and Cheraghi subsequently revised it in 2011 [4]. Huang et al. [1] published a systematic literature review in 2021 that demonstrates the exponential growth of risk analysis publications over the past two decades. Keyword analysis reveals that “FMEA”, “system”, “risk evaluation”, “criticality analysis”, and “failure mode” have risen to prominent positions. Similar findings were published by Liu et al. [5] in 2013. It can be concluded that the FMEA continues to be the most widely utilized tool for risk assessment; however, it is presently employed in conjunction with alternative evaluation approaches [1,5].
Multiple authors [6,7,8] have examined the reasons behind the limited use of FMEA and other risk analysis methods in the supply chain. The researchers conducted an analysis and successfully identified the main factors: the main difficulty impeding wider deployment appears to arise from a lack of understanding of how to apply FMEA within a supply chain environment.
Numerous scholarly articles have highlighted the limitations of the FMEA [5,9,10,11]. As a result, the FMEA was revised through a collaborative effort between AIAG and VDA. The AIAG-VDA FMEA 1st Edition, a novel FMEA framework, was published in the year 2019 [2]. The recent update to the system includes the addition of a chapter titled “Monitoring and System Response”. In this update, the Risk Priority Number (RPN) has been replaced with Action Priority Tables. Furthermore, a comprehensive approach consisting of seven steps, namely: planning, structure analysis, function analysis, failure analysis, risk analysis, optimization, and documentation of results has been implemented. The utilization of the Severity (S), Occurrence (O), and Detection (D) scales persists, and it is advisable for the team to evaluate them in a manner consistent with a conventional FMEA. The utilization of the Action Priority Level, which is determined based on the values of the S, O, and D components from a designated Action Priority (AP) Table, has replaced the use of RPN. The suggested table for AP levels is derived from the values assigned to the components S, O, and D. However, it is subject to modification based on factors such as the nature of the business, the specific process, or the industry involved. The AP table delineates the instances in which the organization is authorized to initiate action, as opposed to the responsibility falling upon the FMEA Team. No action is required for Low AP levels, while any lack of action for Medium AP levels should be adequately justified. In the case of High AP levels, immediate action must be taken to mitigate the risk. This suggests that instead of relying on the RPN value, the actions are selected based on the specific values of the factors. Regrettably, as demonstrated in Table A6, the current system is incapable of accurately discerning the actual amount of risk.
It may be inferred from the existing body of research that the supply chain industry uses risk analysis methods that closely resemble those employed in various other domains. The authors exclusively employ the FMEA [12,13,14] assessment technique, or a modified version of FMEA with factors limited to 5 levels instead of 10 [15]. Alternatively, they utilize mixed evaluation techniques such as Fuzzy-FMEA [11,16,17,18,19], Fuzzy-AHP [20,21], FMEA-ANP [22], or Fuzzy Bayesian-based FMEA [14]. Fuzzy FMEA [19] is considered the second most often utilized risk analysis technique, following the FMEA method. The three membership functions commonly utilized in Fuzzy FMEA are triangular, trapezoidal, and Gaussian [23,24,25].
The conventional approach for assessing supply chain risk predominantly involves employing the FMEA framework, which incorporates three key factors: Severity, Occurrence, and Detection. A limited number of authors argue against the adequacy of three factors and instead propose the utilization of models that incorporate either four (expense, time, flexibility, and quality) [26] or five (likelihood, consequence of time/delay, consequence of additional expense, consequence of damage to quality, and visibility) [27] factors. In the present case, commonly employed variables were assessed, namely Visibility and Consequence, with the latter being determined by the provider’s delay, the cost associated with the supplier, and the quality of the given components.
In the context of supply chain risk analysis, new factors have emerged, such as Quality, Time, Cost [14,26], Intensity [13], Consequence [8], Effect, Cause, Measure [28], and others.
The multiplication aggregation function remains the most commonly employed way for analyzing the usage of aggregation functions [6,7,8,21,28]. The second approach integrates Fuzzy analysis with FMEA [11,16,17,20].
Organizations, irrespective of their business, are clearly susceptible to both internal and external threats that might disrupt their supply chain. This document provides a limited selection of illustrative examples instead of a comprehensive collection of all possible failures. A preliminary example was created at the manufacturing facility where the case study was conducted and is represented by the subsequent enumeration. The framework integrates perspectives obtained from comprehensive industry expertise, audit results from both internal and external sources, instructor lectures during educational sessions, analysis of current events, and customer queries. Similar works published by subsequent authors [29,30,31,32] further contributed to the expansion of our knowledge and were duly incorporated into our knowledge base.
Internal supply chain interruption can potentially arise due to:
  • Instances of internal operational disruptions;
  • Instances of significant management, staff, and operational procedure changes;
  • Instances of failure to implement contingency plans in response to problems;
  • Instances of inadequate implementation of cybersecurity policies and controls leading to cyberattacks and data breaches;
  • Instances of non-compliance with labor laws or environmental standards;
  • Instances of unavailability of products to meet customer demands (attributable to inventory issues, ERP system malfunctions, human errors, etc.).
The external supply chain risk might arise due to factors such as:
  • Unpredictable or misunderstood consumer demand;
  • Delays in the transportation and distribution of commodities, encompassing many types such as components, finished products, and raw materials;
  • The potential risks posed by terrorism, armed conflict, economic or political penalties, as well as social, governmental, and economic challenges;
  • The management of supplier risk includes concerns regarding the physical infrastructure and regulatory compliance of a supplier;
  • Natural disasters, such as tornadoes, hurricanes, floods, droughts, landslides, and earthquakes;
  • Human errors occur at all levels and in all locations.
The above list serves as an exemplification of the types of factors that ought to be taken into account; nevertheless, they should be considered in light of the region’s past supply chain issues, trends, and potential challenges.
In summary, a pertinent, functional, and adaptable instrument for performing supply network risk assessment is currently non-existent. It is imperative that supply chain managers and risk analysts have easy access to this instrument, considering the aforementioned activities and global developments that have an impact on the supply chain. The forthcoming instrument ought to enhance its efficacy in discerning credible threats, encompass a more extensive spectrum of risk factors surpassing the present three boundaries, and uphold a degree of user-friendliness comparable to that of the conventional FMEA methodology.
To put constraints aside, it is frequently necessary to monitor a great number of factors; thus, a risk evaluation framework was developed in accordance with these concepts. It was also considered that numerous authors attempted to utilize alternative aggregation methods, such as Euclidean, multiplicative, additive, median, or other functions. Alternatively, they attempted to integrate FMEA with AHP, ANP, TOPSIS, or other methodologies, frequently employing Fuzzy logic. Combining the aforementioned, the TREF method was developed [33,34] in response to these articles. TREF now was expanded to include a Fuzzy-FMEA function with multiple factors. The issue at hand pertains to the optimal aggregating function. This is an attempt to be answered in the article.
This article in Section 1 conducts an extensive literature review on techniques for managing risks in supply chains and provides a concise overview of the many types and levels of factors that are taken into account. Section 2 of the article explores further methods of aggregating several risk factors, namely more than three, by expanding on the commonly used Failure Mode and Effects Analysis (FMEA) as a fundamental framework. The framework is improved by integrating the Fuzzy-FMEA methodology. Furthermore, this study undertakes a comparative analysis of various risk analysis methodologies within the context of the flexible TREF-based risk evaluation framework. The techniques are graded using the TOPSIS algorithm in the following manner. Section 3 provides a clear set of instructions for effectively putting the concept into practice. Section 4 presents a case study that examines the analysis of supply chain risks in an automotive manufacturing service organization as a Tier 2 supplier. Section 5 provides an exposition of the findings obtained from this case study.

2. Mathematical Background

Several authors acknowledged in the preceding chapter that three factors are insufficient for a comprehensive risk assessment. As the number of factors increases, the aggregation function becomes more intriguing. The same limitations that are evident in the FMEA become apparent when employing multiplicative aggregation, which is the same logic as the aggregation function in the FMEA. As a result, the research investigates the criteria that define an aggregation function, the various types of aggregation functions that can be employed, and the benefits and drawbacks of these functions in the context of risk assessment.

2.1. Aggregation Functions Criteria

In the study conducted by the authors in [35,36,37], various aggregating functions were examined. Aggregation functions necessitate several conditions [38,39], including validity, monotonicity, sensitivity, symmetricity, linearity, scale fit, and scale endpoint identity.
  • Validity: Consider the manner in which the risk emanates from the constituents.
    F : I n R ; x I n ; a , b R ; F ( x ) = a , and F ( x ) = b a = b
  • Monotonicity: refers to the property of a function where it exhibits non-decreasing behavior, meaning that it yields a non-negative reaction to any increase in its arguments. In other words, the function does not reduce its output value when any input value is increased.
    F : I n R x , x I n , x x F ( x ) F ( x )
    The membership functions and the defuzzification function employed in this study exhibit monotonic characteristics.
  • Sensitivity refers to the degree of responsiveness or reactivity exhibited in a certain context. In the specific scenario of rigorous monotonicity, sensitivity pertains to the extent to which a change in one variable directly and consistently influences a change in another variable.
    F : I n R i [ n ] F ( x ) F ( x + λ ) x I , λ 0 x + λ I
  • The property of symmetricity, also known as commutativity, is true when the components or elements of a distribution follow a symmetric distribution. In such cases, the distribution of the aggregated values also exhibits symmetry. This property is also observed in the Fuzzy functions employed.
    F : I n R F ( x ) = F ( | x | )
  • Linearity refers to the property where, in the scenario of components or factors adhering to a uniform distribution, the resulting distribution of the aggregated values will also exhibit uniformity.
  • Scale fitting: The aggregate processes should be conducted using the scale values that have been applied. This criterion is also met as the range of each factor is identical.
  • Scale endpoint identity: In order to adhere to the boundary criteria, the endpoints of the scales were modified to fall within the interval [1, 10]. This adjustment was important as it ensured that each factor’s potential values were defined within the same range.

2.2. Risk Aggregation Functions

Definition 1.
Let f = [ f 1 , f 2 , , f n ] T , ( n 3 , n N ) be the vector representing the set of risk factors. Let r = S ( f ) represent the resulting risk value, where S is a monotonous aggregation function. The risk aggregation protocol (RAP) is denoted as ( f , S ) .
Remark 1.
It is commonly assumed that the risk factors f i and f j , where ( i j ) are independent of one another. Nevertheless, the proposed RAP does not need its independence.
According to the provided definition, the quantity of factors, including severity, detection, incidence, cost, and others, is denoted by the variable n { 3 , 4 , 5 , } N . The risk ranking numbers, denoted as f i { 1 , 2 , , 10 } are related to factor i. This input will be employed by aggregation functions to evaluate each risk case.
Several instances of aggregation functions S are as follows, along with their respective output ranges:
  • S 1 ( f ) = i : = 1 n f i is the geometric mean of risk factors. If n = 3, and the factors are severity, occurrence, and detection, we have the original RPN (risk priority number) from the FMEA. S 1 ( f ) 1 , 10 n N
  • S 2 ( f ) = M e d i a n ( { f } ) is the median of risk factors. S 2 ( f ) 1 , 10 N
  • S 3 ( f ) = 1 n i : = 1 n f i is the average of risk factors. S 3 ( f ) 1 , 10 R +
  • S 4 ( f ) = i : = 1 n f i 2 is the generalized n-dimensional radial distance of risk factors. S 4 ( f ) n , 10 n R +
  • S 5 ( f ) = Aggregation of Fuzzy membership functions based on rule base. In this case, the output function range depends on the defuzzyfication function established by user, and can be in any prespecified range.
The utilization of risk analysis inside the supply chain is not as prevalent as it ideally should be, primarily due to a lack of competence among purchasing, procurement, and logistics managers, as stated in the preceding chapter. The risk assessment framework, known as [33], has undergone an expansion to incorporate a fuzzy module. This addition has been implemented to effectively address the issue at hand.

2.3. Implementation of Fuzzy

The methodology employed in the previously disclosed fuzzy aggregation function will not be altered. Fuzzy logic comprises three distinct phases, with the initial one being Fuzzyfication/Fuzzyfier. In this phase, the factors (crisps) are converted into fuzzy input variables in the form of membership functions. The subsequent process, Inference, produces output fuzzy variables by utilizing the fuzzy rule base to ascertain which control actions ought to be executed in light of the fuzzy input variables. This constituent could potentially be considered an aggregation protocol. In the concluding phase, Defuzzyfication/Defuzzifier, the produced output is transformed back into genuine output variables, namely the value and/or risk level.

2.3.1. Fuzzyfication/Fuzzyfier

Initially, it is necessary to define the input fuzzy variables by employing the input membership functions. This implies that fuzzy membership functions should be used to convert each risk factor into an input fuzzy variable. The designation for these values is “crisps”. A multitude of linguistic variables influence the number of membership functions associated with a given variable. Typically, Fuzzy FMEA utilizes three to seven linguistic variables [40,41]. It is possible to incorporate additional variables; however, in the given context, the rule base became exceedingly intricate. In the beginning, the input fuzzy variables must be defined through the utilization of input membership functions. Accordingly, each risk factor should be converted into an input fuzzy variable utilizing fuzzy membership functions. These qualities are referred to as “crisps”. The number of membership functions attributed to a specific variable is influenced by an abundance of linguistic variables. Fuzzy FMEA generally employs between three and seven linguistic variables [40,41]. Although it is feasible to include further variables, doing so would have rendered the rule base significantly complex in the given context.
At the beginning and end of the interval, the sigmoid function was implemented:
μ ( x , a , b ) s i g u = 0 , x a 1 1 + e a ( x b ) , any other case
μ ( x , a , b ) s i g d = 1 1 1 + e a ( x b ) , x a 0 , any other case
where a is the steepness of function, and b is the inflection point.
For each range within the interval, the bell/splay function is applied:
μ ( x , a , b , c ) s p l = 1 1 + | x b a | 2 c
where b is the center of function, a is the width of curve and c is the steepness of function.
Both the splay and bell are Gaussian membership functions that were selected due to their smoothness, non-zero value at all point intervals, continuous differentiability, and mathematical and computational tractability [25].
As illustrated in Figure 1, for n = 5 (5 linguistic levels), in accordance with its original score or crisp, each component is converted into the sum of n membership functions.
S i ( f i ) = i : = 1 n μ i ( x ) , x 10 and x R + , other variables of membership functions are constants ( a , b , c ).
Each factor will have its own sum of membership functions, noted S i ( f i ) , f i { 1 , 2 , , 10 } N , representing the ranking of risk converted in a number.

2.3.2. Fuzzy Rule Base

An analogy can be drawn between the sum of the fuzzy membership functions and the accumulation of factors comprising the fuzzy rule base. The literature also contains considerable variation regarding the selected aggregation method for fuzzy sets: only sums, products, maximal functions, or the Mamdani Fuzzy Inference (MFI) are employed due to the more comprehensible and intuitive nature of their rule bases. The MFI functions optimally in expert system applications in which the norms are established based on the expertise possessed by human beings. The input of this aggregation consists of fuzzy sets, and the output is also a fuzzy set. The output is determined by the center of mass or gravity, and the rule basis is a simple IF-THEN structure. An instance of this can be described as follows:
W i ( S i ) = S 1 ( f i ) S 2 ( f j ) S n ( f n )
where ⊗ is the aggregation protocol.

2.3.3. Defuzzyfication

The final phase entails the transformation of the amount of risk from a fuzzy state to a crisp state. In this phase, the determination of risk level will be achieved by converting the membership functions in real numbers. Several viable defuzzification strategies, including:
  • Center of gravity of area—see Figure 2;
  • Bisector of area refers to a vertical line that partitions a fuzzy set into two sub-regions of equivalent area. The phenomenon in question may exhibit alignment with the center of gravity, however this correlation is not universally observed;
  • Mean of Max level;
  • Largest of Max—the max value of the highest output membership function;
  • Max—the max limit value achieved by any output function;
  • Smallest of Max—the lowest value of the highest output membership function;
  • Low—is the lowest value achieved by any output function.
The computation of the center of gravity of the membership function is performed, considering the factor’s value, and subsequently, the results are aggregated.
x i = μ C ( x ) x d x μ C ( x ) d x
μ C ( X ) d x represents the measure of the region enclosed by the membership function C. If the parameter μ C is established based on multiple discrete membership functions, the center of gravity can be mathematically represented as the summation of these functions.
x i = i = 1 N μ C ( x i ) x i i = 1 N μ C ( x i )
In actuality, it is feasible to explicitly determine the center of gravity of membership functions by clearly describing the functions. The following diagram presents a visual representation of the methodologies employed in the calculation of accurate output (Figure 2).
The case study detailed in Section 4 employs the center of gravity methodology.
It can be asserted that the chosen and implemented fuzzy function, which includes the defuzzification process with the exception of sensitivity, satisfies every one of the six criteria previously outlined as prerequisites for an aggregate function. Given that the input values consist of natural numbers ranging from [1, 10], this aspect becomes relatively inconsequential (Section 2.1).

2.4. Evaluating the Results of Used Aggregation Functions

Two approaches appeared viable for comparing the outcomes produced by the aggregating functions. One is when the range of output arguments of functions is set to be identical; this is typically resolved by multiplying the values by a constant. This was promptly abandoned due to the potential complexity that the behavior of the functions would have introduced to the situation. An alternative approach entails comparing the output values generated by distinct aggregating functions in the same order in which they assign equivalent risks. This methodology will be further implemented, elucidated in the validation methodology, and will be applied in the case study.

2.4.1. Rank Correlation

The Spearman’s rank correlation coefficient is a statistical measure that quantifies the strength and direction of the association between two variables:
r s = 1 6 i = 1 N ( R X i R Y i ) 2 N ( N 2 1 )
where R X i and R Y i represent the ranks of the first and second variables, respectively. The sign and magnitude of the value both fall within the range of [ 1 ; + 1 ] .

2.4.2. TOPSIS (Technique for Order Preference by Similarity to Ideal Solution)

The application of a multi-criteria decision analysis technique will be employed to evaluate a set of alternatives and ascertain the ranking of the risk analysis models implemented. The TOPSIS method chooses the alternative that has the shortest geometric distance from a positive ideal solution and the greatest geometric distance from a negative ideal solution [42].
Let A represent the pairwise comparison matrix for factors as follows:
A = a 11 a 1 n a n 1 a n n
where a i j are the judgement scores, considering a i j = 1 / a j i , and a i i = 1 . This matrix is normalized with:
k i j = a i j j = 1 n a i j
The local weight resulting:
w i = j = 1 n k i j n
The variables h i are used to represent the risk incidents, where i ranges from 1 to n. Similarly, the variables f j are employed to designate the TOPSIS evaluation criteria, with j ranging from 1 to m. The variable x i j represents the numerical results of the alternative h i with respect to the criteria f j .
The formula for the normalized decision matrix can be expressed as follows:
d i j = x i j j = 1 m x i j 2
The weighted normalized decision matrix elements can be generated as follows:
V i j = w i × d i j
The ideal best solution V j + and ideal worst solution V j are determined by aggregating the highest and lowest values of each criterion.
For beneficial criteria:
V j + = m a x [ V i j ] V j = m i n [ V i j ]
For non-beneficial criteria:
V j + = m i n [ V i j ] V j = m a x [ V i j ]
Euclidian distances are measured from the ideal best ( S i + ) and ideal worst ( S i ) values:
S i + = j = 1 m ( V i j V j + ) 2 S i = j = 1 m ( V i j V j ) 2
The performance score (relative closeness to the ideal solution) can be calculated:
P i = S i S i + + S i
The ranked options are subsequently arranged in descending order as the final step.
This methodology is suitable for pairwise correlation analysis, specifically when the number of variables being compared does not exceed seven. Implementing this strategy gets problematic in situations where there are more than ten hazards, which is a frequently seen phenomenon in real-world scenarios. An illustration depicting the initial use of the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) may be observed in the [43] context.
When evaluating a case that involves more than seven significant individual hazards, it is recommended to engage a team of experts who possess comprehensive expertise regarding the consequences associated with each risk. The individuals possess the capability to produce a matrix that facilitates the rating of effects, dangers, and impacts, alongside another matrix that enables the evaluation of results. One can utilize RSTUDIO to input both matrices and calculate their ranks using the TOPSIS algorithm [44]. This methodology will be represented in Section 4 Step 6 & 7 and in the case study ( Section 5).

3. Designing Steps for Practical Implementation and Validation

This chapter elucidates the practical application of the aforementioned theory. It is crucial to highlight that risk analysis is a qualitative approach that necessitates the involvement of a qualified team or teams. This team should include representatives from all areas of risk and the respective departments responsible for analyzing and evaluating them. Certain industries, like the automotive sector, have a competitive edge due to their reliance on specialized teams who collaborate closely through the entire product life cycle, from design to mass production to end-of-life.
Figure 3 illustrates the steps of evaluation, which are utilized in both the subsequent analysis of the theoretical framework and the case study.
Step 0—Forming the Team: An assemblage of experts with specialized knowledge in logistics, quality management, risk assessment, evaluation, and mitigation, including all relevant departments such as finance/controlling or others, should be formed. Many firms already own risk assessment teams, such as the FMEA team in the automotive sector, which is mandated by the IATF16949:2016 [45] QMS standard. It is crucial that this team demonstrate dedication and possess the appropriate expertise to thoroughly test, assess, and validate the risk strategy. The team composition should be adaptable, so that additional experts from different departments may join based on the analysis conducted. Although referred to as Step 0, this essentially serves as the foundation of the evaluation approach.
Step 1—Hazards identification: This step is a comprehensive gathering of all supply chain concerns, encompassing claims, losses, and delays. It also involves analyzing news from a related business sector, including potential future events. It is imperative to consider the heightened vulnerability to cyber-attacks, dissemination of misinformation, potential conflicts, and climate fluctuations within the logistical network. If the business has conducted prior risk analyses, those should also be included in this gathering. Each input should be taken into consideration.
Step 2—Factors setting: The list from Step 1 should be used to identify the most accurate factors that describe the risk of organization, department, or process. This phase is exceptionally challenging. The factors included in the FMEA, namely detectability, severity, and occurrence, serve as a solid foundation. However, if there are other elements within these that can enhance our ability to precisely characterize the associated risk, they should be incorporated. In addition to the three previously mentioned factors, supply chains also utilize various other elements such as quality, time, cost, intensity, consequence, effect, cause, and measure. The quantity of factors is contingent upon the intricacy of the business or logistic procedures, traffic patterns, business affiliations, and other pertinent considerations (ex. sustainability, energy saving, …). It is imperative to assess these factors on a case-by-case basis for each company, as the level of risk may vary depending on factors such as geographical location, supply chain network pattern, technological infrastructure, workforce availability and expertise, environmental conditions, core technological capabilities, political/economical/regional stability, etc. If a novel component can enhance the risk analysis from the perspective of the organization’s functioning, it is recommended to utilize it. It is important to note that the elements should be linked to specific levels, which are ideally defined by the organization. However, it is recommended that the number of levels should be an even number. Typically, 10 levels are employed, although there is flexibility to differ from this standard.
Step 3—Risk assessment: In this section, we determine the levels of the factors for each risk. The FMEA manual contains specific guidelines for the Severity, Detector, and Occurrence settings in the level settings. For instance, if human detection is involved, the Detectability value must not be lower than 6. Similarly, in manufacturing, if certain areas or parameters are designated as SC (Significant Characteristic) or CC (Critical Characteristic) the Severity value must not be lower than 7. Such regulations can also be implemented for novel factors, particularly once the organization has gained proficiency in their utilization.
Step 4—Set aggregation methods: This step involves the selection of the aggregating functions that we intend to utilize for the purpose of analysis.
The standard FMEA will be utilized as a fundamental framework and point of comparison. Due to the inclusion of three levels (L, M, and H) in the revised FMEA, it is important to note that these levels serve solely as indicators for subsequent evaluation and are not intended for the purpose of risk prioritization. Due to this rationale, the analysis will not incorporate the new FMEA.
In the preceding FMEA, the term used to refer to this was Risk Priority Number (RPN). Organizations established a certain RPN level that necessitated action to decrease the risk. In the context of ISO9001:2015 [46], this threshold is typically regarded as the midpoint within the range of factors, resulting in a value of 125 for three factors ( 5 3 = 125 ). In the automotive industry, companies individually define this limit, which generally falls around 100 or lower, as determined by management. Moreover, when the most severe and imperceptible process flaw is amalgamated with a significantly low occurrence score, the Risk Priority Number (RPN) will amount to 100 (1 × 10 × 10), a value that falls below the commonly employed action criterion threshold by several firms. The implementation of the updated FMEA methodology will yield a slightly more accurate outcome. However, its effectiveness remains inadequate, as the risk level was merely the result of implementing risk mitigation measures. If individuals are not justified, it is imperative that they become justified.
Every organization has the autonomy to make a decision regarding whether to accept, mitigate, or acknowledge specific hazards. Based on the aforementioned information, the management of the company or the risk assessment team of experts can ascertain the specific aspects that accentuate the level of risk.
Section 2 provided a detailed presentation of numerous aggregation functions. However, it is possible to introduce additional aggregation functions that adhere to the criteria of aggregation functions.
Step 5—Evaluate the risk with each method: The risk level can be assessed by utilizing each of the selected aggregating functions.
Step 6—Order the results via TOPSIS method and by the experts: This pertains to the arrangement of outputs resulting from aggregating functions. This step comprises two components: the application of the TOPSIS algorithm for ordering and the ordering process conducted by the expert team members.
The determination of the ranking by the TOPSIS method, employing the weight technique. Upon doing risk analysis using the aforementioned six risk analysis functions, the resulting risk values are calculated and subsequently arranged in a certain order. This process enables the risk analysis functions to be compared with one another, marking the completion of Step 6.
Step 7—Evaluation and validation: The assessment of outcomes carries considerable significance at this phase, and requires meticulous and strategic preparation. The risk evaluation expert team was asked to form a committee including the most experienced individuals to assign incidents, disregarding the rankings already published or the outcomes of the risk assessment. This indicates that the indicated persons have a deficiency in understanding the output values of TOPSIS ranking and the results of the aggregation functions.
This committee will make a ranking effect matrix (see as example Table A7) and the impact matrix (see also an example Table A9) using their respective scores. The precision of these matrices is of utmost importance as it exerts a substantial influence on the final result. This implies that the perspectives of a specific cohort of specialists with substantial expertise in evaluating the relative effects of each approach should be considered.
The validation of the method involves comparing the results of the committee with the ranking made via TOPSIS. If it coincides, that will be the best aggregation function that can be used by the organization.
The risk assessment is conducted using individuals, thereby yielding qualitative data. Applying any aggregating function to these values yields a qualitative outcome, irrespective of the mathematical functions used to rank the data, such as AHP, TOPSIS, etc. Nevertheless, by conducting the same comparison using the most seasoned experts from the risk analysis team and employing the aforementioned comparative mathematical tools, the outcome should be identical. The occurrence of human error can be mitigated by conducting this study again with the group. Using this method, the most appropriate aggregating function for risk analysis within the organization.

4. Case Study

The experimental study is focused on an electronic manufacturing services (EMS) supplier. Conducting testing within the comprehensive supply chain offers several advantages owing to the central location of this EMS (see Figure 4).
In certain instances, manufacturers ( S x ) or, in extreme circumstances, direct customers ( C x ) are occasionally chosen as the source for larger quantities of raw materials or components, despite the customary practice of EMS firms to procure them via distributors ( D x ) . This holds particularly true in cases when the design of the final product is still undergoing development or when it becomes imperative to conduct tests on updated components. To facilitate the installation of these units by original equipment manufacturers (OEMs), the EMS delivers the goods to direct customers ( C x ) . Subsequently, these customers engage in further processes, such as the development of more intricate modules, testing, and programming.
Under some circumstances, the EMS may also provide the carmaker with goods directly, as indicated by the E M S - O x connection in Figure 4. The instances of S x and D x have been simplified in the EMS. They are treated as a single node or “location” because the EMS communicates with them through their Distribution Centers or Offices, even though they consist of several factories/locations. Various logistical groups play a crucial role in facilitating the transportation of products between different nodes throughout the process. This case study offers a comprehensive opportunity to analyze a wide range of supply chain issues.
The automotive industry places significant importance on the availability of raw materials for manufacture, ensuring that they are provided at the appropriate time, quantity, and quality. Additionally, the industry recognizes the need for problem-free production, which is not the focus of this study, and the timely and accurate delivery of products to customers. Any departure from this stipulation leads to supplementary costs or a decrease in revenue.
A team of professionals specializing in logistics, quality management, risk assessment, finance/controlling, and FMEA was assembled within the EMS firm. The primary objective of this team was to conduct comprehensive testing, analysis, and validation of the entire approach.
Step 1—Hazards identification: The present study conducted an exhaustive analysis of various supply chain concerns, including claims, losses, and delays, spanning a period of four years. Subsequently, a comprehensive inventory of risks was compiled. In this particular case, a total of 20 unique concerns were identified.
Step 2—Factors setting: The criteria for evaluating each factor, specifically Occurrence, Severity, and Detection, are presented in Table A1, Table A2, and Table A3, respectively. These tables may be found in the Appendix A.
Step 3—Risk assessment: The findings of the FMEA analysis, considering the aforementioned criteria, are presented in Table A6. The result was generated by employing both the previous FMEA standard, which solely considered the initial three factors (Occurrence, Severity, and Detectability), and the present FMEA standard which includes the AP (Action Priority) levels.
Table A6 illustrates three factors that are insufficient in appropriately highlighting the true level of threat. This is the reason why certain authors and researchers have started incorporating supplementary variables (such as performing analysis with four or five components).
The upper echelons of management within this EMS company were engaged in consultation, resulting in the selection of two more factors, namely control and cost.
The cost refers to the estimated financial impact incurred due to errors or inefficiencies in handling or logistics. Within the realm of literature, this particular element is commonly referred to as “Value”.
The second factor is the Control factor, which assesses the feasibility and effectiveness of controlling, preventing, or mitigating a process, and determines the extent to which it can be achieved. Please refer to Table A4 and Table A5 for a comprehensive overview of the established evaluation criteria pertaining to the supplementary components.
Step 4—Set aggregation methods: The present set of factors include Severity, Occurrence, Detectability, Cost, and Control. The next step involves the selection of the aggregating functions that we intend to utilize for the purpose of analysis. The standard FMEA will be utilized as a fundamental framework and point of comparison. Additional aggregating functions that will be employed encompass Multiplication, Average, Sum, and Euclidean Distance, augmented with Fuzzy. These functions consist of five elements and are all encompassed inside the TREF technique. All of these topics are addressed in Section 2.2.
The fuzzyfication function, depicted in Figure 1, is consistent across all five failure factors, namely severity, occurrence, detectability, cost, and controllability. With the exception of the initial and final functions, each function possesses a range in which its value is non-zero, and the midpoint is denoted. The variable M i d k represents the midpoint, while k denotes the number of linguistic variables utilized to describe each failure. In all instances, the membership function takes on values inside the range of 0 to 1. Here, A k represents the count of non-zero elements in k S , k O , and k D . The variables S, O, D, Cs, and Cn are used to denote the severity, occurrence, detection, cost, and controllability, respectively.
Step 5—Evaluate the risk with each method: The risk level can be determined by employing each of the six aggregating functions.
Step 6—Order the results via TOPSIS method and by the experts: The outcomes of the aggregation functions are presented in this order, employing two distinct methods: TOPSIS and the expert group.
The determination of the ranking by the TOPSIS method, employing the weight technique. The symbol k i represents the average value of the membership function, with i denoting the factors S, O, D, Cs, and Cn. Upon doing risk analysis using the aforementioned six risk analysis functions, the resulting risk values are calculated and subsequently arranged in a certain order. This process enables the risk analysis functions to be compared with one another, marking the completion of Step 6. The ranking outcomes are displayed in Table 1 below:
The subsequent results are presented herein upon inputting all the data into R’s TOPSIS analysis program [44] with uniform weights, while considering the assessment of impacts (see Table 2):
To illustrate the potential outcome in the absence of an expert-established importance matrix, a random impact matrix was employed, yielding the following result (see Table A8). The highest rank (6) gives the best result.
Step 7—Evaluation and validation: The ranking effect matrix (Table A7) and the impact matrix (Table A9) were generated by expert members using their respective scores.
Table 3 displays the outcomes obtained from employing the matrices indicated earlier as weight and impact in the TOPSIS analysis program implemented in R [44].
In this scenario, the highest rank also yields the most optimal outcome.
This ordering is the same as the ordering made by experts.
The observation reveals that both the ordering obtained with the random impact matrix (refer to Table 2) and the ordering generated with the weighted impact matrix (refer to Table 3) indicate optimal aggregation function no. 6, namely the TREF FMEA.

5. Discussion and Result

The ranking of the several aggregation approaches, ranging from the riskiest (method 1) to the safest (method 6), is provided in Table 3. The finding that the basic FMEA with only three variables ranks as the riskiest is not unexpected, as experts emphasize the significance of two additional factors, namely Cost and Control, which are deemed highly important and justified.
The ranking of the remaining five risk aggregation methods, which consider five factors as input and employ multiplicative, average, median, modified Euclidean distance, and fuzzy functions, is very interesting.
The utilization of the frequency perspective in the assessment process can prove to be useful. The Crystal Ball (https://www.oracle.com/applications/crystalball/, accessed on 24 November 2023) application developed by Oracle, which is an add-in for Microsoft Excel, was employed for this purpose. For the examination of three variables, specifically for the conventional FMEA, the trial number was established at 10,000. In this particular case, the sensitivity for each element was 33.3 % . In the case of evaluating five factors, the trial numbers were set to 100,000 to achieve equal sensitivity for each element, with each factor accounting for 20% of the total.
The figures that were generated to illustrate the distribution of frequencies and values are presented in Figure 5.
A comprehensive summary of the simulations conducted using Oracle’s Crystal Ball is provided in Table 4.
The Skewness in Table 4 pertains to the absence of symmetry in the dataset, whereas the Kurtosis assesses whether the data exhibit heavy (positive values) or light (negative values) tails relative to a normal distribution.
Upon examination of the simulation figure (Figure 5), it is evident that:
  • The results obtained via the Multiplication Aggregation Method, as depicted in Figure 5b, exhibit a level of comparability to those obtained from a conventional FMEA. However, it should be noted that the former method involved the consideration of five components, whereas the latter method typically considers three components. The linearity of the Multiplication technique and the standard FMEA is commendable. Consequently, the outcome for a scenario including n factors will yield a range of [ 1 , 10 n ] N for each factor, where the range of each factor is [ 1 , 10 ] N . The concerns of FMEA are equally relevant in this particular case.
  • The input range and output range for the Average aggregate in Figure 5c are identical, spanning from 1 to 10. This method demonstrates strong linearity. The presence of extreme values can pose challenges in some scenarios. In that case, if one factor attains its maximum value and the remaining factors maintain low values, the resulting output will nevertheless fall below the midpoint of the output range. In this particular scenario, the presence of low-value components effectively mitigates the impact of any extreme values, hence impeding the identification and analysis of potential risks.
  • The Median aggregation yields the lowest Skewness score, as depicted in Figure 5d, suggesting that the data exhibits a high degree of symmetry. The Kurtosis score of our dataset is rather low, suggesting a moderate level of customization in the data. This situation bears a resemblance to the Average aggregation approach.
  • The linearity is only average and the computation is challenging in the case of the Euclidean distance (generalized) aggregate (see Figure 5e). Interpretation is challenging in n-dimensional space where n > 3 , n N . In the case of n factors, the output will be [ n , 10 n ] R + for each factor’s range of values of [ 1 , 10 ] N . The linearity of the Euclidean distance (generalized) aggregate is only average, and its computation is problematic, as depicted in Figure 5e.
  • The outcome data for the Fuzzy aggregation method (refer to Figure 5f), which is determined by the used membership and defuzzification functions, exhibit similarities to those of the TREF Multiplication. However, it is important to note that the output consists of just five primary groups (see Figure 1).
In conclusion, it is important to acknowledge that aggregations utilizing multiplication approaches, such as FMEA, generalized TREF Multiplication, and TREF Fuzzy with respect to defuzzification, yield the most unfavorable distribution. However, their significant contributions become essential in situations when elements exhibit elevated levels of risk.
The reason for arranging each output in decreasing order was to ensure that this pattern was accurately represented. The comparative analysis of rank modifications for various aggregation functions is illustrated in Figure 6.
The present graphic depiction of Alluvian representation serves to emphasize the discrepancies in ordering through the comparison of an initial state and a subsequent state. The depiction, however, commences with the conventional outcomes of the FMEA as a refference, considering the sequential Risk Priority Number (RPN) or output values. Subsequently, it demonstrates the alteration in prioritization of the aforementioned risk subsequent to the implementation of the novel aggregate function. The final diagram encompasses a triple figure that visually represents the transition from the conventional FMEA to the enhanced FMEA incorporating risk levels. This diagram enables readers to discern the differences between the two approaches. Additionally, the diagram includes the TREF Multiplicative, which functions as a comprehensive representation of various components. Please refer to Figure 6e for further details.
The comparison between the conventional FMEA and the TREF Fuzzy method depicted in Figure 6b holds significant importance in this study as it demonstrates the optimal results achieved by the utilization of the TREF Fuzzy aggregation function, as indicated in Table 3. The outcome was validated by the team of experts.
Outcome: The results obtained from this approach have been implemented, following the PDCA model (see Figure 3), and are presently under close scrutiny. If a new type of failure or unforeseen outcomes arise, the analysis will be repeated. After a period of six months of usage, no variation has been seen.
Remark: The purpose of this paper is to provide a comprehensive guide for the identification of risks connected with Supply Chain Management (SCM). Its objective is to facilitate a thorough understanding of various risk variables and their corresponding significance. This document imposes some limitations, with the exception of donations. The process of prioritizing risks is contingent upon the thorough examination, evaluation, and distinctive perspectives that have surfaced pertaining to the manufacturing facility in question, and at the specific moment of the expert’s deliberation. Consequently, a hasty method has the potential to significantly undermine the precision and reliability of the investigation.

6. Summary

On the basis of the data in Table 3 and Table 4, and Figure 6b it is possible to conclude that the introduction of the two new factors substantially prolonged the identification of actual risks, i.e., risks that cause substantial damage emerged. The methodology that was demonstrated, as well as explained in the Case Study, is readily implementable by SCM decision-makers. This aids them in identifying the fundamental risks that require preparation and consequently facilitates the identification of such risks. The comprehensive exposition of the method’s implementation steps in the case study renders them universal, and applicable to sectors and industries beyond supply chain management.

Author Contributions

Conceptualization, Z.T.K.; methodology, Z.T.K. and I.M.; validation, Z.T.K.; formal analysis, I.M.; investigation, I.M.; data curation, I.M.; visualization, I.M.; writing, I.M.; supervision, Z.T.K.; founding acquisition, Z.T.K.; validation, Z.T.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been implemented by the TKP2021-NVA-10 project with the support provided by the Ministry of Culture and Innovation of Hungary from the National Research, Development and Innovation Fund, financed under the 2021 Thematic Excellence Programme funding scheme.

Data Availability Statement

The majority of the data is presented in the article. The complete data collection is available upon request from the authors.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
APAction Priority, the term used in the new
AHP    Analytical Hierarchy Process
AIAGAutomotive Industry Action Group, is a not-for-profit association created to
develop recommendations and a framework for the improvement of quality
in the North American automotive industry
ANPAnalytical Network Process
ERPEnterprise Resource Planning
FMEAFailure Mode and Effect Analysis
MFIMamdani Fuzzy Inference
OEMOriginal Equipment Manufacturers, refers to the car companies in this article
QMSQuality Management System (ISO9001, IATF16949, etc.)
PDCAPlan, Do, Check, and Act—the basis of any continuous improvement model
RPNRisk Priority Number
SCMSupply Chain Management
TOPSISTechnique for Order Preference by Similarity to the Ideal Solution
TREFTotal Risk Evaluation Framework, is a generalized risk evaluation tool
Tier XSuppliers in the automotive industry are organized in sequential levels called Tiers.
The number X means how far are they from the OEM
VDAVerband der Automobilindustrie, is the German Association of the Automotive Industry

Appendix A

Table A1. Criteria for evaluating the frequency of Occurrence of logistic defects at incoming.
Table A1. Criteria for evaluating the frequency of Occurrence of logistic defects at incoming.
Probability of OccurrenceOccurrence DefinitionScore
NeverNever1
UnlikelyOnce a year2
Very lowOnce a month3
LowOnce a week4
MediumOnce a day5
Medium highDaily 2–4 time6
ImportantDaily 5–10 time7
Very importantOnce in an hour8
Very very importantHourly 2–4 time9
Extremely importantHourly more than 6 time10
Table A2. Criteria for evaluating the severity of the logistic failure defects.
Table A2. Criteria for evaluating the severity of the logistic failure defects.
Severity of FailureSeverity RankingScore
No discernible effectNo discernible effect1
Slight inconvenience in logistic processAlarm at SCM2
Can cause short stopsRed alarm at SCM3
Can cause considerable stops in processCan cause written remark4
Small stops at Tier1Warning from Tier15
Several small stops at Tier1Escalation by Tier16
Serious stops at Tier1Red alarm at Tier17
Delay at final customerEscalation start from final customer8
Small stops at final customerEmergency at final customer9
Serious stop at final customerStop final customer10
Table A3. Criteria for assessing the detection of defects.
Table A3. Criteria for assessing the detection of defects.
Probability of DetectionDetection EffectScore
Automatic detectionNo effect1
Extremely Easy detectionEasy to detect2
Very high probabilitySmall delays3
High probabilityDetected delays4
MediumLate deliveries5
LittleSeveral late deliveries6
Very littleLine stops7
Hard to detectSeveral line stops8
Extremely highCustomer stop9
UndetectableEnd customer stop10
Table A4. Criteria for evaluating the cost of logistic defects.
Table A4. Criteria for evaluating the cost of logistic defects.
Probability of CostCost DefinitionScore
NeverNo cost1
Very smallNon-significant2
SmallTens of €3
LowHundreds of €4
Medium low1–2 k€5
Medium2–5 k€6
Significant5–10 k€7
High10–25 k€8
Very High25–100 k€9
Extremely highOver 100 k€10
Table A5. Criteria for evaluating the controllability of logistic defects.
Table A5. Criteria for evaluating the controllability of logistic defects.
Probability of ControlControl DefinitionScore
Fully controlledNo attention required1
Exceedingly simple to controlNeeds small attention2
Simple to controlAttention3
Gap in controlEasy re-planning4
Several gaps in controlRe-planning5
Serious gaps in controlFast reaction6
Difficult to controlSeveral fast reactions7
Very difficult to controlDifficult8
Partially out of controlVery difficult9
Completely out of controlImpossible10
Table A6. A detail from the standard and new FMEA analysis results for 3 factors.
Table A6. A detail from the standard and new FMEA analysis results for 3 factors.
NoProcessSub-ProcessFailure modeEffectOSDRPNAP
1handlingat supplierdamagedstop prod/cust299162H
2handlingduring transpdamagedstop prod/cust297126M
3handlingduring uploadingdamagedstop prod/cust297126M
4handlingduring downloadingdamagedstop prod/cust297126M
5handlingdelay(nat.hol)delay in productionstop cust or delay17749M
6transportdelay trafficdelay in productionstop cust or delay19654M
7transportdelay disasterdelay in productionstop cust or delay110660M
8transportaccidentdelay in productionstop cust or delay110660M
9mat.orderingorder mistakestop productionstop customer110660M
10IT systemIT failuresystem errorstop customer110660M
11WHmat.orderingmat shortage at reseller or supplystop customer110660M
12WHmat.orderingmat. shortage market situstop customer110660M
13WHmat.orderingdistrib WH issuestop customer110660M
Table A7. Ranking of effect by experts from EMS company.
Table A7. Ranking of effect by experts from EMS company.
NoC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18C19C20
C114.54510.33217.5731.52.50.8363.58.55.56.50.5
C20.2210.831.20.250.170.330.2532.50.50.330.50.21.50.67422.50.25
C30.251.211.50.290.180.40.293.530.670.330.50.220.834.51.52.50.2
C40.20.830.6710.220.150.40.293.530.670.330.50.220.834.51.52.50.2
5C143.54.510.5151.276.52.5120.55.537.5560.67
C6365.56.5213.52.598.54.53417.559.5781
C70.532.530.670.2910.836.551.30.91.20.441.56.53.54.50.33
C8143.540.830.41.216.5621.21.50.6752.57.54.55.50.5
C90.130.330.290.40.140.110.150.1510.80.220.170.20.130.150.2520.50.830.12
C100.140.40.330.50.150.120.20.171.2510.250.180.220.130.830.2930.670.910.13
C110.3321.520.40.220.770.54.5410.670.910.2931.252.53.50.25
C120.67333.510.331.110.8365.51.511.20.50.2226.5450.4
C130.4222.50.50.250.830.6754.51.10.8310.333.51.25.5340.29
C141.2555.5212.51.587.53.52316.548.5670.83
C150.170.670.50.670.180.130.250.26.51.20.334.50.290.1510.420.831.20.14
C160.291.51.21.50.330.20.670.443.50.830.50.830.252.515230.22
C170.120.250.220.290.130.110.150.130.50.330.20.150.180.120.50.210.40.670.11
C180.180.50.670.770.20.140.290.2221.50.40.250.330.171.20.52.511.20.15
C190.150.40.40.560.170.130.220.181.21.10.290.20.250.140.830.331.50.8310.13
C2024561.571328.5842.53.51.274.596.57.51
Table A8. Random evaluation of impacts in all risk cases.
Table A8. Random evaluation of impacts in all risk cases.
NoC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18C19C20
Eval++++++++++
Table A9. Evaluation of impacts in all risk cases based on ranking matrix.
Table A9. Evaluation of impacts in all risk cases based on ranking matrix.
NoC1C2C3C4C5C6C7C8C9C10C11C12C13C14C15C16C17C18C19C20
Eval++++++++++

References

  1. Huang, J.; You, J.X.; Liu, H.C.; Song, M.S. Failure mode and effect analysis improvement: A systematic literature review and future research agenda. Reliab. Eng. Syst. Saf. 2020, 199, 106885. [Google Scholar] [CrossRef]
  2. AIAG-VDA. Failure Mode and Effects Analysis–FMEA Handbook, 1st ed.; Automotive Industry Action Group: Southfield, MI, USA, 2016; Volume 1. [Google Scholar]
  3. Dickson, W.G. An analysis of vendor selection systems and decisions. J. Purch. 1966, 2, 5–20. [Google Scholar] [CrossRef]
  4. Cheraghi, S.H.; Dadashzadeh, M.; Subramanian, M. Critical Success Factors For Supplier Selection: An Update. J. Appl. Bus. Res. 2011, 20, 91–108. [Google Scholar] [CrossRef]
  5. Liu, H.C.; Liu, L.; Liu, N. Risk evaluation approaches in failure mode and effects analysis: A literature review. Expert Syst. Appl. 2013, 40, 828–838. [Google Scholar] [CrossRef]
  6. Curkovic, S.; Scannell, T.; Wagner, B. Using FMEA for Supply Chain Risk Management. Mod. Manag. Sci. Eng. 2013, 1, 251–256. [Google Scholar]
  7. Curkovic, S.; Scannell, T.; Wagner, B. ManagingSupply Chain Risk, Integrating with Risk Management; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
  8. Vodenicharova, M. Opportunities for the applications of FMEA Model in logistics processes in Bulgarian enterprises. Logist. Sustain. Transp. 2017, 8, 31–41. [Google Scholar] [CrossRef]
  9. Lolli, F.; Ishizaka, A.; Gamberini, R.; Rimini, B.; Messori, M. FlowSort-GDSS–A novel group multi-criteria decision support system for sorting problems with application to FMEA. Expert Syst. Appl. 2015, 42, 6342–6349. [Google Scholar] [CrossRef]
  10. Malekitabar, H.; Ardeshir, A.; Sebt, M.H.; Stouffs, R.; Teo, E.A.L. On the calculus of risk in construction projects: Contradictory theories and a rationalized approach. Saf. Sci. 2018, 101, 72–85. [Google Scholar] [CrossRef]
  11. Wu, X.; Wu, J. The Risk Priority Number Evaluation of FMEA Analysis Based on Random Uncertainty and Fuzzy Uncertainty. Complexity 2021, 2021, 8817667. [Google Scholar] [CrossRef]
  12. Ewa Kulinska, D.M.; Dendera-Gruszka, M. New Application of FMEA Analysis in the Heavy Industry Supply Chain. Eur. Res. Stud. J. 2021, 24, 600–616. [Google Scholar] [CrossRef]
  13. Ebadi, A.; Keyghobadi, A.R.; Motadel, M.R.; Yeganegi, M.R. The Analysis of Sustainable Supply Chain Risks Based on the FMEA Method in the Oil and Gas industry and Factors Affecting Risk Management. Pet. Bus. Rev. 2020, 4, 95–116. [Google Scholar] [CrossRef]
  14. Indrasari, L.D.; Vitasmoro, P.; Pariyanto, A.Y.T. FMEA Approach to Risk Factors as a Factor in Implementing Green Supply Chain Management (Study in PT. Gresik Cipta Sejahtera). J. Phys. Conf. Ser. 2021, 1858, 012069. [Google Scholar] [CrossRef]
  15. Aleksic, B.; Djekic, I.; Miocinovic, J.; Memisi, N.; Smigic, N. Application of FMEA Analysis in the Short Cheese Supply Chain. Meat Technol. 2020, 61, 161–173. [Google Scholar] [CrossRef]
  16. Mustaniroh, S.A.; Murod, F.A.I.K.; Silalahi, R.L.R. The risk assessment analysis of corn chips supply chain using Fuzzy FMEA. IOP Conf. Ser. Earth Environ. Sci. 2020, 475, 012052. [Google Scholar] [CrossRef]
  17. Trenggonowati, D.L.; Bahauddin, A.; Ridwan, A.; Wulandari, Y. Proposed Action of Supply Chain Risk Mitigation Air Compressor Type L Unloading ¼ HP Using The Fuzzy–FMEA and Fuzzy–AHP Method in PT. XYZ. J. Innov. Technol. 2021, 2, 10–17. [Google Scholar] [CrossRef]
  18. Lu Lu, R.Z.; de Souza, R. Enhanced FMEA for supply chain risk identification. In Proceedings of the Hamburg International Conference of Logistics (HICL), Hamburg, Germany, 13–14 September 2018; Hamburg University of Technology (TUHH): Hamburg, Germany, 2018; pp. 311–330. [Google Scholar] [CrossRef]
  19. Petrović, D.V.; Tanasijević, M.; Milić, V.; Lilić, N.; Stojadinović, S.; Svrkota, I. Risk assessment model of mining equipment failure based on fuzzy logic. Expert Syst. Appl. 2014, 41, 8157–8164. [Google Scholar] [CrossRef]
  20. Trenggonowati, D.L.; Ulfah, M.; Arina, F.; Lutfiah, C. Analysis and strategy of supply chain risk mitigation using fuzzy failure mode and effect analysis (fuzzy fmea) and fuzzy analytical hierarchy process (fuzzy ahp). IOP Conf. Ser. Mater. Sci. Eng. 2020, 909, 012085. [Google Scholar] [CrossRef]
  21. Canbakis, S.K.; Karabas, M.; Kilic, H.S.; Koseoglu, S.; Unal, E. A risk assessment model for supply chains. Pressacademia 2018, 7, 122–125. [Google Scholar] [CrossRef]
  22. Zammori, F.; Gabbrielli, R. ANP/RPN: A multi criteria evaluation of the Risk Priority Number. Qual. Reliab. Eng. Int. 2011, 28, 85–104. [Google Scholar] [CrossRef]
  23. Ling, W.K. Nonlinear Digital Filters; Elsevier Ltd.: Boston, MA, USA, 2004. [Google Scholar]
  24. Kubler, S.; Robert, J.; Derigent, W.; Voisin, A.; Traon, Y.L. A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications. Expert Syst. Appl. 2016, 65, 398–422. [Google Scholar] [CrossRef]
  25. Johanyák, Z.; Kovács, S. On the right selection of the fuzzy membership function. GAMF J. 2004, 19, 73–84. [Google Scholar]
  26. Zhu, Q.; Golrizgashti, S.; Sarkis, J. Product deletion and supply chain repercussions: Risk management using FMEA. Benchmarking Int. J. 2020, 28, 409–437. [Google Scholar] [CrossRef]
  27. Wan, C.; Yan, X.; Zhang, D.; Qu, Z.; Yang, Z. An advanced fuzzy Bayesian-based FMEA approach for assessing maritime supply chain risks. Transp. Res. Part E Logist. Transp. Rev. 2019, 125, 222–240. [Google Scholar] [CrossRef]
  28. Dendera-Gruszka, M.; Kulińska, E. Supply Chain FMEA Risk Analysis for the Heavy Industry Sector. In Risk Management and Assessment; IntechOpen: London, UK, 2020. [Google Scholar] [CrossRef]
  29. Salamai, A.; Hussain, O.K.; Saberi, M.; Chang, E.; Hussain, F.K. Highlighting the Importance of Considering the Impacts of Both External and Internal Risk Factors on Operational Parameters to Improve Supply Chain Risk Management. IEEE Access 2019, 7, 49297–49315. [Google Scholar] [CrossRef]
  30. Roscoe, S.; Eckstein, D.; Blome, C.; Goellner, M. Determining how internal and external process connectivity affect supply chain agility: A life-cycle theory perspective. Prod. Plan. Control. 2020, 31, 78–91. [Google Scholar] [CrossRef]
  31. Srivastava, M.; Rogers, H. Managing global supply chain risks: Effects of the industry sector. Int. J. Logist. Res. Appl. 2022, 25, 1091–1114. [Google Scholar] [CrossRef]
  32. Mohammed, A.; Jabbour, A.B.L.d.S.; Diabat, A. COVID-19 pandemic disruption: A matter of building companies’ internal and external resilience. Int. J. Prod. Res. 2023, 61, 2716–2737. [Google Scholar] [CrossRef]
  33. Kosztyán, Z.T.; Csizmadia, T.; Kovács, Z.; Mihálcz, I. Total risk evaluation framework. Int. J. Qual. Reliab. Manag. 2020, 37, 575–608. [Google Scholar] [CrossRef]
  34. Kovács, Z.; Kosztyán, Z.T.; Csizmadia, T. TREF–Total Risk Evaluation Framework: Integrált kockázatmenedzsment-szemléletű keretrendszer kifejlesztése és bevezetése egy magyarországi termelővállalatnál. Vezetéstudomány/Bp. Manag. Rev. 2014, 45, 71–82. [Google Scholar] [CrossRef]
  35. Kovács, Z.; Csizmadia, T.; Mihálcz, I.; Kosztyán, Z.T. A vállalati kockázatkezelésben használt aggregálófüggvények jellemzése. Statisztikai Szle. 2022, 100, 821–853. [Google Scholar] [CrossRef]
  36. Calvo, T.; Kolesárová, A.; Komorníková, M.; Mesiar, R. Aggregation Operators: Properties, Classes and Construction Methods. In Aggregation Operators; Physica-Verlag HD: Heidelberg, Germany, 2002; pp. 3–104. [Google Scholar] [CrossRef]
  37. Grabisch, M.; Marichal, J.L.; Mesiar, R.; Pap, E. Aggregation functions: Means. Inf. Sci. 2011, 181, 1–22. [Google Scholar] [CrossRef]
  38. Grabisch, M.; Marichal, J.L.; Mesiar, R.; Pap, E. Aggregation Functions (Encyclopedia of Mathematics and Its Applications); Cambridge University Press: Cambridge, UK, 2009; Volume 127, pp. 428–453. [Google Scholar]
  39. Zahedi Khameneh, A.; Kilicman, A. Some Construction Methods of Aggregation Operators in Decision-Making Problems: An Overview. Symmetry 2020, 12, 694. [Google Scholar] [CrossRef]
  40. Kozarević, S.; Puška, A. Use of fuzzy logic for measuring practices and performances of supply chain. Oper. Res. Perspect. 2018, 5, 150–160. [Google Scholar] [CrossRef]
  41. Cardiel-Ortega, J.J.; Baeza-Serrato, R. Failure Mode and Effect Analysis with a Fuzzy Logic Approach. Systems 2023, 11, 348. [Google Scholar] [CrossRef]
  42. Chakraborty, S. TOPSIS and Modified TOPSIS: A comparative analysis. Decis. Anal. J. 2022, 2, 100021. [Google Scholar] [CrossRef]
  43. Bognár, F.; Hegedűs, C. Analysis and Consequences on Some Aggregation Functions of PRISM (Partial Risk Map) Risk Assessment Method. Mathematics 2022, 10, 676. [Google Scholar] [CrossRef]
  44. Yazdi, M.M. TOPSIS Method for Multiple-Criteria Decision Making (MCDM). R Package. Available online: https://rdrr.io/cran/topsis/man/topsis.html (accessed on 24 November 2023).
  45. IATF16949-2016; Quality Management System Requirements for Automotive Production and Relevant Service Parts Organizations. AIAG: Southfield, MI, USA, 2016. Available online: https://www.aiag.org/quality/iatf-16949-2016 (accessed on 1 December 2023).
  46. ISO9001-2015; Quality Management Systems—Requirements. ISO: Geneva, Switzerland, 2015. Available online: https://www.iso.org/standard/62085.html (accessed on 1 December 2023).
Figure 1. The structure of Fuzzy membership functions for each factor.
Figure 1. The structure of Fuzzy membership functions for each factor.
Mathematics 12 00841 g001
Figure 2. Used defuzzyfication methods to obtain the final output value.
Figure 2. Used defuzzyfication methods to obtain the final output value.
Mathematics 12 00841 g002
Figure 3. Determination of the appropriate risk evaluation method.
Figure 3. Determination of the appropriate risk evaluation method.
Mathematics 12 00841 g003
Figure 4. The supply chain map of the EMS company.
Figure 4. The supply chain map of the EMS company.
Mathematics 12 00841 g004
Figure 5. Results—Frequency. (a) Standard FMEA frequency/values distribution. (b) TREF multiplication frequency/values distribution. (c) TREF average frequency/values distribution. (d) TREF median frequency/values distribution. (e) TREF Euclidean distance frequency/values distribution. (f) TREF fuzzy frequency/values distribution.
Figure 5. Results—Frequency. (a) Standard FMEA frequency/values distribution. (b) TREF multiplication frequency/values distribution. (c) TREF average frequency/values distribution. (d) TREF median frequency/values distribution. (e) TREF Euclidean distance frequency/values distribution. (f) TREF fuzzy frequency/values distribution.
Mathematics 12 00841 g005
Figure 6. Results—Alluvian representation of original FMEA ranking with the used 5 TREF functions. (a) FMEA with TREF Multiplication. (b) FMEA with TREF Fuzzy. (c) FMEA–TREF Median. (d) FMEA–TREF Average. (e) FMEA–New FMEA–TREF Multiplicative.
Figure 6. Results—Alluvian representation of original FMEA ranking with the used 5 TREF functions. (a) FMEA with TREF Multiplication. (b) FMEA with TREF Fuzzy. (c) FMEA–TREF Median. (d) FMEA–TREF Average. (e) FMEA–New FMEA–TREF Multiplicative.
Mathematics 12 00841 g006
Table 1. A detail from the ranking matrix composed from the standard FMEA, TREF Multiplicative, Tref Average, TREF Median, TREF Distance, and TREF Fuzzy functions—the last 5 evaluations were made using 5 factors.
Table 1. A detail from the ranking matrix composed from the standard FMEA, TREF Multiplicative, Tref Average, TREF Median, TREF Distance, and TREF Fuzzy functions—the last 5 evaluations were made using 5 factors.
NoR. FMEAR. TREF MultiR. TREF AverR. TREF MediR. TREF DistR. TREF Fuzzy
111515171417
22171718178
33181819189
45131414167
541919201916
6192020162020
7181616151513
89777715
91055542
10611213
1111666511
127333614
13121413131212
Table 2. Ranking of methods using TOPSIS without considering the weights.
Table 2. Ranking of methods using TOPSIS without considering the weights.
Alt. RowNameScoreRank
1FMEA0.63083741
2TREF Multi0.43126194
3TREF Aver0.43387593
4TREF Medi0.44145422
5TREF Dist0.41322245
6TREF FMEA0.25164966
Table 3. Ranking of methods using TOPSIS with weights.
Table 3. Ranking of methods using TOPSIS with weights.
Alt. RowNameScoreRank
1FMEA0.59593221
2TREF Multi0.55293833
3TREF Aver0.55382192
4TREF Medi0.54182044
5TREF Dist0.53642035
6TREF FMEA0.15673006
Table 4. Characteristics of different aggregation methods for 5 factors including the standard FMEA with 3 factors.
Table 4. Characteristics of different aggregation methods for 5 factors including the standard FMEA with 3 factors.
ItemFMEATREF MultiTREF AverTREF MedianTREF EucDistTREF Fuzzy
Factors355555
Skewness1.663.34−0.0025−0.003−0.323.28
Kurtosis5.7718.842.362.373.0217.91
Min111128
Max1000100,00010102277,348
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mihálcz, I.; Kosztyán, Z.T. REFS-A Risk Evaluation Framework on Supply Chain. Mathematics 2024, 12, 841. https://doi.org/10.3390/math12060841

AMA Style

Mihálcz I, Kosztyán ZT. REFS-A Risk Evaluation Framework on Supply Chain. Mathematics. 2024; 12(6):841. https://doi.org/10.3390/math12060841

Chicago/Turabian Style

Mihálcz, István, and Zsolt T. Kosztyán. 2024. "REFS-A Risk Evaluation Framework on Supply Chain" Mathematics 12, no. 6: 841. https://doi.org/10.3390/math12060841

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop